2017-01-08 17:24:03 +01:00
|
|
|
package obscure
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
|
2019-07-28 19:47:38 +02:00
|
|
|
"github.com/rclone/rclone/cmd"
|
|
|
|
"github.com/rclone/rclone/fs/config/obscure"
|
2017-01-08 17:24:03 +01:00
|
|
|
"github.com/spf13/cobra"
|
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
2019-10-11 17:58:11 +02:00
|
|
|
cmd.Root.AddCommand(commandDefinition)
|
2017-01-08 17:24:03 +01:00
|
|
|
}
|
|
|
|
|
2019-10-11 17:58:11 +02:00
|
|
|
var commandDefinition = &cobra.Command{
|
2017-01-08 17:24:03 +01:00
|
|
|
Use: "obscure password",
|
2020-06-05 13:48:28 +02:00
|
|
|
Short: `Obscure password for use in the rclone config file`,
|
|
|
|
Long: `In the rclone config file, human readable passwords are
|
|
|
|
obscured. Obscuring them is done by encrypting them and writing them
|
|
|
|
out in base64. This is **not** a secure way of encrypting these
|
|
|
|
passwords as rclone can decrypt them - it is to prevent "eyedropping"
|
|
|
|
- namely someone seeing a password in the rclone config file by
|
|
|
|
accident.
|
|
|
|
|
|
|
|
Many equally important things (like access tokens) are not obscured in
|
|
|
|
the config file. However it is very hard to shoulder surf a 64
|
|
|
|
character hex token.
|
|
|
|
|
|
|
|
If you want to encrypt the config file then please use config file
|
|
|
|
encryption - see [rclone config](/commands/rclone_config/) for more
|
|
|
|
info.`,
|
2017-01-08 17:24:03 +01:00
|
|
|
Run: func(command *cobra.Command, args []string) {
|
|
|
|
cmd.CheckArgs(1, 1, command, args)
|
|
|
|
cmd.Run(false, false, command, func() error {
|
2018-01-18 21:19:55 +01:00
|
|
|
obscured := obscure.MustObscure(args[0])
|
|
|
|
fmt.Println(obscured)
|
2017-01-08 17:24:03 +01:00
|
|
|
return nil
|
|
|
|
})
|
|
|
|
},
|
|
|
|
}
|